Overview
overview
10Static
static
10Battly-Lau...in.exe
windows11-21h2-x64
10resources/...e.json
windows11-21h2-x64
3resources/...e.json
windows11-21h2-x64
3resources/...Me.txt
windows11-21h2-x64
3resources/...e.json
windows11-21h2-x64
3resources/...e.json
windows11-21h2-x64
3resources/...ds.ejs
windows11-21h2-x64
3resources/...ex.css
windows11-21h2-x64
3resources/...n.icns
windows11-21h2-x64
3resources/...on.ico
windows11-21h2-x64
3resources/...on.png
windows11-21h2-x64
3resources/...nd.png
windows11-21h2-x64
3resources/...ar.png
windows11-21h2-x64
3resources/...de.png
windows11-21h2-x64
3resources/...en.png
windows11-21h2-x64
3resources/...es.png
windows11-21h2-x64
3resources/...fr.png
windows11-21h2-x64
3resources/...it.png
windows11-21h2-x64
3resources/...jp.png
windows11-21h2-x64
3resources/...pt.png
windows11-21h2-x64
3resources/...ru.png
windows11-21h2-x64
3resources/...de.png
windows11-21h2-x64
3resources/...en.png
windows11-21h2-x64
3resources/...dex.js
windows11-21h2-x64
3resources/.../de.js
windows11-21h2-x64
3resources/.../en.js
windows11-21h2-x64
3resources/.../es.js
windows11-21h2-x64
3resources/.../fr.js
windows11-21h2-x64
3resources/.../it.js
windows11-21h2-x64
3resources/.../pt.js
windows11-21h2-x64
3resources/...ain.js
windows11-21h2-x64
3resources/...r.html
windows11-21h2-x64
5Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-09-2024 00:03
Behavioral task
behavioral1
Sample
Battly-Launcher-win.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
resources/app/node_modules/color-name/package.json
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
resources/app/node_modules/protocol/package.json
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
resources/app/node_modules/windows-shortcuts/lib/shortcut/ReadMe.txt
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
resources/app/node_modules/windows-shortcuts/package.json
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
resources/app/package.json
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
resources/app/src/ads.ejs
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
resources/app/src/assets/css/index.css
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
resources/app/src/assets/icon.icns
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
resources/app/src/assets/icon.ico
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
resources/app/src/assets/icon.png
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
resources/app/src/assets/images/background.png
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
resources/app/src/assets/images/flags/ar.png
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
resources/app/src/assets/images/flags/de.png
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
resources/app/src/assets/images/flags/en.png
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
resources/app/src/assets/images/flags/es.png
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
resources/app/src/assets/images/flags/fr.png
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
resources/app/src/assets/images/flags/it.png
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
resources/app/src/assets/images/flags/jp.png
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
resources/app/src/assets/images/flags/pt.png
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
resources/app/src/assets/images/flags/ru.png
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
resources/app/src/assets/images/opera_banner_de.png
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
resources/app/src/assets/images/opera_banner_en.png
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
resources/app/src/assets/js/index.js
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
resources/app/src/assets/js/langs/de.js
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
resources/app/src/assets/js/langs/en.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
resources/app/src/assets/js/langs/es.js
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
resources/app/src/assets/js/langs/fr.js
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
resources/app/src/assets/js/langs/it.js
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
resources/app/src/assets/js/langs/pt.js
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
resources/app/src/assets/js/main.js
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
resources/app/src/header.html
Resource
win11-20240802-en
General
-
Target
resources/app/src/header.html
-
Size
38KB
-
MD5
eef60d35e9f75d3c7030d0574250e56f
-
SHA1
6d29148b90187fa1583652bc8799e65efa10f637
-
SHA256
3cf434b126e4369ffb8e9f4d489daee1aad9f47828850386984b3c752cdc7042
-
SHA512
529bf36dacd2fc808e63a8091a8aa92f5d3d39c23077bc72298bf052f1bdcd6fc05282608ce5337643d3c1a794bdde2b8d364f7deb0c4b7ae75810be3bdb165b
-
SSDEEP
768:Xkos/1jkos/1kQj9U38pO4MftndjyQj9U38pO4Mftndjh6:c/a/OQj+O9MftdjyQj+O9Mftdjh6
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
chrome.exedescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133697092472797020" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
chrome.exechrome.exepid process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1080 chrome.exe 1080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe Token: SeShutdownPrivilege 1080 chrome.exe Token: SeCreatePagefilePrivilege 1080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe 1080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1080 wrote to memory of 3908 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3908 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 2804 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 1168 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 1168 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe PID 1080 wrote to memory of 3136 1080 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\resources\app\src\header.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3ef6cc40,0x7fff3ef6cc4c,0x7fff3ef6cc582⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2392,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2388 /prefetch:22⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1380,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2408 /prefetch:32⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1912,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3552,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=212,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4388 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4588,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=744,i,16693677765650236871,15946829451121886578,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=740 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5a1d9fb57632ae805360bdf2b1211d612
SHA1d22af695328325d03aa74313a3bab2edc7148087
SHA25659545b1421d6b4f098365a7748ac4811449355f0ee5c37d0b621be5f08cc845d
SHA512ea61105ebd9f975f92687e6f034fab7cf1899dcb0c7d20b24698654ad2323509473395e706c2fc04ed53a88980fcdb1cc4ee5ab1c245f1eb148a6543947d0926
-
Filesize
961B
MD5118133ca66348e2e2a9f1b9daa1b7880
SHA1970b8fb0d3427a01ef0f7d4b3009dd2405643e4f
SHA256761c51e81e7691cee699b2032ac09f6f51bc58db50bdee828b7963dcdfdc4444
SHA512f43d79f6a597d826ff84fe790b38a36894296ff1b535e39a14ee97138ad17db10b9c2a3e4fba541e70fa569fe6d635ff8c2463206c426f96b5722c50ff906695
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD51caefd9152e4e441759dde540d7de15b
SHA1b213c636aa91df042823b42959ab7a63916ece42
SHA256bbc06bddafb2e2004b600ae3430fc8ee881ce642731b1fbd1911825d1213cc3b
SHA5129eee63d9f56478931f4ddf24452c980eaf198742d16613c94d82b2c4566490a9faab4a8750979ae33c19c835b4f5beeeb6b71ed94cdcfc93741315b7ac48269b
-
Filesize
9KB
MD59ede76f9a3b74297b8a2bb08f330ac39
SHA15583a7b0e22c3c7c71edf58c81ff86ab190dbfe3
SHA256077779ce89086ee99c36c16e21354ee0db412997b3921103e5fe445479ecdbd8
SHA5128a4955a76eab5545d4b179ff0cdef8bae52bcac269f6c1e75db031f494da1d470c6cda8d0dea250a328ecf6c8590c9359e5773aefa15e4bd7972916abb91bb24
-
Filesize
9KB
MD5d3028d7071837f0893eed7e29f5ba8fb
SHA16b48177681b2a7eef711c9854b936c1876b8796e
SHA2562071514c38189c0f51985e449809385e32a3b4efb8e1f5c91989608d973e804e
SHA5124e7262df7eead4f2fc0172e56da7fa80772cd193312fa3d50521d9a6a8426016ebf8411f06dcbb298775f6b6207c87933c6a081e9c6e64066bb0d815559d4358
-
Filesize
9KB
MD52ff4bf0e5b926c97bdd4e6b687095ec9
SHA16f56c1c23feebdaee6a3cb5b97781b6abde178e0
SHA2561c304e71258ad7aa5500fb0acb1f7f1b2ba9071d4ac5828983b287b31329e31c
SHA51213d71b5dc7760467108172a396e1676f08f0220f79cce667feb59332f457001bea6d339b72f2da7902e3304a30874ed3d5385efe9ca2ab6ec5561e02c0b464c9
-
Filesize
9KB
MD592bebb1b08c4c573cdfdd51f532d6cf0
SHA1c305880706727ea413275eef552294b094df0ebb
SHA256eb19b72d9b36ca8d4ec13a6eab9545e15a67b34db95b5c96eca8e22103c87f82
SHA512a58b2558aa75a00235ffe333c5d7661e8a626389b913f8da039e27949c2e9a1b479559eccb4e0de25153a49c5d9bbec611f1412b285f43a4f70f2b6a23c80d37
-
Filesize
101KB
MD5f38ae45a61effe4458ce928a94e7f1d3
SHA1831c9da4b262bbbcae75a46e3ebf60c7aae4ee84
SHA2567cf0a00101094fd5994d92d74cc54cfb25a9b01eb294e04efda850dea3a54f5d
SHA51265efc7ea66067e075e6aacbebaf7c014a1a7ab097c22f6f31e4944e99d24f9232f70ea1384597b2c5e83bc0c8ed8c8b07089a51f675c5e52b7def3842a4af8c6
-
Filesize
101KB
MD5506b5d50a8ca1c4cb1a3d3155bcd22b8
SHA1284361db3fac45b15d3fe9864d34615365de2e05
SHA25647a42dbc29a2472cc2c5632aacb46cc75b732b7f73737e5b84e83e6c04fed519
SHA512128f869a1b9fbe383c7ae016e1c485da7e14e925541e0430132f545bd1eb3900001b2c73bc61a307d59ee6600b03e4615c058b446da754063fce24ed0352a1a8
-
Filesize
101KB
MD5bdb4be505128b2038080524a1b02665d
SHA1e7057a2b9d89522d552563f4f50b47077371d37d
SHA256ea8033644691a414f48230001b50dfaa1e1524845213f70a36242f7fd434cb05
SHA5121bb8a8ea91e61f3fe9b927d433c42cba27701b9a269cdf888dacb20ec1e2be29082e1b5ea2aa40c13095da6418b27fb798b7fed33ef0b93a1fdd413f5b557cb7
-
Filesize
101KB
MD560c499ee4ec59d3843b3b7f3fe46054f
SHA1feace39430969622b81da2901c3dd1d430e9143f
SHA25680216deb702b15fd93ca6d0b707ef6866b81fea88d8ad910db063ce460112b16
SHA51274f11d16d64ba919e6301c6fd696d5236e7a8188c16e655f02b5fd608e532e86129006420f91fcc65f7a52cd3ab82949db4a6786e0e88c3e1fefe5f3bb182a61
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e